{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:08:39Z","timestamp":1761581319300,"version":"3.41.0"},"reference-count":29,"publisher":"Oxford University Press (OUP)","issue":"4","funder":[{"name":"Fonds National de la Recherche, Luxembourg","award":["CO11\/IS\/1206050"],"award-info":[{"award-number":["CO11\/IS\/1206050"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61273222"],"award-info":[{"award-number":["61273222"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IMA J Math Control Info"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1093\/imamci\/dnv026","type":"journal-article","created":{"date-parts":[[2015,6,11]],"date-time":"2015-06-11T10:57:48Z","timestamp":1434020268000},"page":"1081-1102","source":"Crossref","is-referenced-by-count":8,"title":["An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach"],"prefix":"10.1093","volume":"33","author":[{"given":"Yumei","family":"Li","sequence":"first","affiliation":[]},{"given":"Holger","family":"Voos","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Darouach","sequence":"additional","affiliation":[]},{"given":"Changchun","family":"Hua","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2015,6,10]]},"reference":[{"key":"2016122806351216000_33.4.1081.1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2012.09.007"},{"key":"2016122806351216000_33.4.1081.2","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2012.2211873"},{"key":"2016122806351216000_33.4.1081.3","unstructured":"Andersson G. , Esfahani P. M. , Vrakopoulou M. , Margellos K. , Lygeros J. , Teixeira A. , D\u00e1n G. , Sandberg H. , Johansson K. H. (2011) Cyber-security of SCADA systems. Sess. Cyber-Phys. Syst. Secur. A Smart Grid Environ., 1\u20132."},{"key":"2016122806351216000_33.4.1081.4","unstructured":"Anjali S. , Ramesh C. J. (2010) Dual-level attack detection and characterization for networks under DDoS. International Conference on Availability, Reliability and Security, Krakow, pp. 9\u201316."},{"key":"2016122806351216000_33.4.1081.5","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1109\/TCST.2009.2035515","article-title":"A fault diagnosis and security framework for water systems","volume":"18","author":"Eliades","year":"2010","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"2016122806351216000_33.4.1081.6","unstructured":"Hashim F. , Kibria M. R. , Jamalipour A. (2008) Detection of DoS and DDoS attacks in NGMN using frequency domain analysis. Proceedings of APCC2008."},{"key":"2016122806351216000_33.4.1081.7","doi-asserted-by":"publisher","DOI":"10.1109\/87.845876"},{"key":"2016122806351216000_33.4.1081.8","doi-asserted-by":"crossref","unstructured":"Li Y. M. , Voos H. , Darouach M. (2014a) Robust $H_{\\infty }$ fault estimation for control systems under stochastic cyber-attacks. 33rd China Control Conference, Nanjing, China, pp. 3124\u20133129.","DOI":"10.1109\/ChiCC.2014.6895451"},{"key":"2016122806351216000_33.4.1081.9","doi-asserted-by":"crossref","unstructured":"Li Y. M. , Voos H. , Darouach M. , Hua C. (2015) An algebraic detection approach for control systems under multiple stochastic cyber-attacks. IEEE\/CAA Journal of Automatica Sinica (in press).","DOI":"10.1109\/JAS.2015.7152659"},{"key":"2016122806351216000_33.4.1081.10","doi-asserted-by":"crossref","unstructured":"Li Y. M. , Voos H. , Rosich A. , Darouach M. (2014b) A stochastic cyber-attack detection scheme for stochastic control systems based on frequency-domain transformation technique. The 8th International Conference on Network and System Security, Xian, China, pp. 209\u2013222.","DOI":"10.1007\/978-3-319-11698-3_16"},{"key":"2016122806351216000_33.4.1081.11","doi-asserted-by":"crossref","unstructured":"Liu Y. , Reiter M. K. , Ning P. (2009) False data injection attacks against state estimation in electric power grids. ACM Conference on Computer and Communications Security, Chicago, USA, pp. 21\u201332.","DOI":"10.1145\/1653662.1653666"},{"key":"2016122806351216000_33.4.1081.12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"2016122806351216000_33.4.1081.13","unstructured":"Mo Y. , Sinopoli B. (2010) False data injection attacks in control systems. First Workshop on Secure Control Systems, Stockholm, Sweden."},{"key":"2016122806351216000_33.4.1081.14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160297"},{"key":"2016122806351216000_33.4.1081.15","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSECP.2003.1219056","article-title":"Inside the Slammer worm","volume":"1","author":"Moore","year":"2003","journal-title":"IEEE Secur. Priv."},{"key":"2016122806351216000_33.4.1081.16","unstructured":"New \u2018cyber attacks\u2019 hit S Korea, http:\/\/news.bbc.co.uk\/2\/hi\/asia-pacific\/8142282.stm."},{"key":"2016122806351216000_33.4.1081.17","unstructured":"Nimda worm. (2001) http:\/\/www.cert.org\/advisories\/CA-2001-26.html."},{"key":"2016122806351216000_33.4.1081.18","unstructured":"Pasqualetti F. (2012) Secure control systems: a control-theoretic approach to cyber-physical security. A Dissertation for the degree of Doctor of Philosophy in Mechanical Engineering ."},{"key":"2016122806351216000_33.4.1081.19","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/TAC.2011.2158130","article-title":"Consensus computation in unreliable networks: a system theoretic approach","volume":"56","author":"Pasqualetti","year":"2012","journal-title":"IEEE Trans. Auto. Control"},{"key":"2016122806351216000_33.4.1081.20","doi-asserted-by":"crossref","unstructured":"Rosich A. , Voos H. , Li Y. M. , Darouach M. (2013) A model predictive approach for cyber-attack detection and mitigation in control systems. IEEE 52nd Annual Conference on Decision and Control, Italy, pp. 6621\u20136626.","DOI":"10.1109\/CDC.2013.6760937"},{"key":"2016122806351216000_33.4.1081.21","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-0-387-75462-8_6","article-title":"Lessons learned from the Maroochy water breach","volume":"253","author":"Slay","year":"2007","journal-title":"Critical Infrastructure Protection"},{"key":"2016122806351216000_33.4.1081.22","first-page":"1","article-title":"Cyber-physical system security for the electric power grid","volume":"99","author":"Sridhar","year":"2012","journal-title":"Proc. IEEE"},{"key":"2016122806351216000_33.4.1081.23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2088690"},{"key":"2016122806351216000_33.4.1081.24","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2014.09.003"},{"key":"2016122806351216000_33.4.1081.25","doi-asserted-by":"crossref","unstructured":"Teixeira A. , P\u00e9rez D. , Sandberg H. , Johansson K. H. (2012) Attack models and scenarios for networked control systems. HiCoNS'12, Beijing, China, pp. 55\u201364.","DOI":"10.1145\/2185505.2185515"},{"key":"2016122806351216000_33.4.1081.26","doi-asserted-by":"crossref","unstructured":"Teixeira A. , Sandberg H. , Johansson K. H. (2010) Networked control systems under cyber attacks with applications to power networks. Proceedings of the American Control Conference, pp. 3690\u20133696.","DOI":"10.1109\/ACC.2010.5530638"},{"key":"2016122806351216000_33.4.1081.27","doi-asserted-by":"crossref","unstructured":"Weimer J. , Kar S. , Johansson K. H. (2012) Distributed detection and isolation of topology attacks in power networks. HiCoNS 12, Beijing, China, pp. 65\u201371.","DOI":"10.1145\/2185505.2185516"},{"key":"2016122806351216000_33.4.1081.28","doi-asserted-by":"crossref","unstructured":"Wolf M. , Daly P. W. (2009) Security Engineering for Vehicular IT Systems. Wiesbaden: Vieweg-Teubner\/GWV Fachverlage GmbH.","DOI":"10.1007\/978-3-8348-9581-3"},{"key":"2016122806351216000_33.4.1081.29","unstructured":"Zhou K. , Doyle J. C. , Glover K. (1996) Robust and Optimal Control. Upper Saddle River, NJ, USA: Prentice-Hall Inc."}],"container-title":["IMA Journal of Mathematical Control and Information"],"original-title":[],"language":"en","deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T14:43:33Z","timestamp":1748443413000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/imamci\/article-lookup\/doi\/10.1093\/imamci\/dnv026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,10]]},"references-count":29,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,12,28]]},"published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1093\/imamci\/dnv026"],"URL":"https:\/\/doi.org\/10.1093\/imamci\/dnv026","relation":{},"ISSN":["0265-0754","1471-6887"],"issn-type":[{"type":"print","value":"0265-0754"},{"type":"electronic","value":"1471-6887"}],"subject":[],"published":{"date-parts":[[2015,6,10]]}}}